web hosting miami kolkata web design

emptyweb hosting supportOur Datacentre and Network MapRead our Terms of ServiceApply as PHP programmer in KolkataContact Us , Phone Support, Tickets, web hosting Knowledgebase
#
uk webhosting
reseller hosting, private label resellers
About WEBSYS Featuredhost CompanyLinux Windows ^ Reseller Web Hosting PlansDomain Registration Transfer and Resellerweb hosting supportorder web hostingweb design kolkata india offshore website designing
empty
empty
     
 
Managed Servers

"Looking for Fully Managed Dedicated Servers ? Click here to order one "
 
 
     
 
 
 
     
 
E-commerce Paypal Shopping Cart

"Looking for a shopping cart site with Paypal ? Click here to to submit a custom requirement "
 
 
     
 

Acceptable Usage Policy

The Acceptable Use Policy ("Policy") explains the proper conduct and prohibited uses of FeaturedHost's Services (collectively called Plan(s)). It is essential in providing quality service, and protecting all our customers' privileges. By registering for the Plan(s), and accepting the Terms and Conditions, you also acknowledge, and accept that you are also bound by this Policy, and agree to abide by this Policy for as long as you are bound by the Terms and Conditions agreement.

 
 
Modification. ModificationFeaturedHost reserves the right to update this Policy at anytime and will be immediately effective upon posting to our website, www.FeaturedHost.com .

Violations. Violation of this Policy is strictly prohibited. Any violation will result in immediate suspension, termination and/or compensations awarded to FeaturedHost for damages caused by these violations as detailed in this Policy. You shall remain solely liable and responsible for your use of the Plan(s) and any all content that you display, upload, download, or transmit through the use of the Plan(s). FeaturedHost will be the sole arbiter as to what constitutes a violation of this policy. 

Illegal Use. You may use FeaturedHost's Plan(s) for lawful purposes only. Transmission, distribution, sale, or storage of any material that violates any law, regulation or this Policy is strictly prohibited. This includes, without limitation: copyrighted material; trademarks; patent; trade secrets, material that obscene, defamatory, constitutes an illegal threat or violates export control laws. Examples of unacceptable content or links include: pirated software, hacker programs or archives, Warez sites. FeaturedHost reserves the right to restrict, prohibit, or remove any content that FeaturedHost determines in its sole discretion to be harmful to the server, networks, equipment, reputation, customer or any other third party.

E-mail. Spamming, the sending of unsolicited mass email from, through, or towards FeaturedHost's server is strictly prohibited. Spamming includes, without limitation: (1) any form of advertising such as commercial advertising; (2) informational announcements to people who do not request them; (3) harassing e-mails, whether through language, frequency, amount, or size; (4) chain letters; (5) malicious e-mail such as "mail bombing"; (6) e-mail containing forged or false information, including the mail-sender and routing information, and subject header; (7) any Safe-list mass mailer; (8) script run on and/or from FeaturedHost's servers sending out mass-mail. Any report generated by an independent firm advising FeaturedHost as to a possible spamming account will result in the suspension of the account until such time as the account is vindicated or it has been concluded that the aforementioned account has proven to be spamming. You will also violate this policy if you use the services of other ISP or IPP to spam, but channeling these activities to your Plan(s) on FeaturedHost's server. FeaturedHost will be the sole arbiter as to what constitutes a violation of this provision. Any violation of this provision will result in immediate termination of your account, plus accessed a minimum fine of $200

Legal. use of Mass-mailing features must follow all of these requirements: (1) User joined the specific list in use on their own free will; (2) user has the ability to remove their name from that specific list; (3) the previous ability needs to be on each e-mail sent to the user; (4) Your Mail must be compliant with FeaturedHost A.U.P. Article 4 Sub-section A

Usage. We do not allow any kind of illegal software downloads on our servers. Any violation of this, will result in termination of the your account.

Adult Content. Adult-oriented sites, pornography and sex-related merchandising are prohibited. This includes sites that may infer sexual content of any kind or provide links to adult content elsewhere. We also prohibit sites that provide storage, sale, distribution, hypertext link to, advertisement, promotion or hosting of material that is unlawful, defamatory, obscene, harmful, threatening, harassing, or an intrusion of privacy or publicity rights, or otherwise objectionable.

CGI-scripts. CGI-script sharing among domains not hosted by FeaturedHost is strictly prohibited. Any CGI-scripts considered to be harming system performance or network integrity will be shut down without prior notice.

System and Network Security. Any form of violation of FeaturedHost's, or any third party's server, system, or network security through the use of the Plan(s) are prohibited and may result in criminal or civil liability. FeaturedHost may investigate such incidents involving such violations and cooperate with the proper law enforcement authorities if a criminal violation is suspected. This includes, without limitation: (1) distributing or hosting content, destructive or harmful content including, without limitation, viruses, Trojan Horses, worms, time bombs, eggdrops, cancel bots or any computer programming routines that may damage or interfere with any system, program, data or personal information; (2) any form of hacking or unauthorized access, which includes, without limitation, use probing, or scanning of systems security or authentication measures, data or traffic; (3) interference with service to any user, host, or network including any form of attempts to overload a system, any form of system attacks, or forgery which can come from any kind of program/script/command or messages of any kind designed to interfere with a user's terminal session, via any means, locally or by internet; (4) any form of interception which includes, without limitation, unauthorized monitoring of data or traffic on any network, server or system without express authorization from the owner; (5) any form of avoidance of system restriction; (6) and any form of failure to safeguard accounts which includes, without limitation, failure to prevent unauthorized access by giving away passwords.

 
empty
empty
Choose your shared or reseller hosting package
quality web hosting uk
Web design company
SEO by - Indian Seo Company
Copyright © 2001- 2013, Websys
  Home | Sitemap | Terms of Service